Deploying Public, Private, and Hybrid Storage Clouds

Everyone has heard talk of cloud but do you know how to deploy one? This session will be a technical dive into implementations of popular public, private, and hybrid storage cloud use cases and best practices examples of how they can fit into your existing IT operations. SNIA's Cloud Storage Initiative (CSI) has created the Cloud Data Management Interface (CDMI) as a de jure standard which can assist you in your cloud deployments utilizing both traditional file systems and new cloud file system formats. This presentation will dive into the details of designing and deploying public, private, and hybrid storage clouds including how CDMI can assist with cloud federation, peering, differentiation, and how CDMI can interact with external systems for event management, configuration management, workflows, auditing, billing, and authorization.

•Understanding how cloud computing and specifically CDMI interact with traditional file systems (CIFS, NFS, FC) and new cloud formats such as Amazon S3.
•Gain an understanding of how cloud can integrate into existing IT Service Management (ITSM) or ITIL best practices for event, configuration, incident, and problem management.
•Presenting in detail reference architectures for cloud and an overview of the reference deployments done to date and how it fits into standard tiered storage enterprise architectures

Using the microservice architectural paradigm allows you to develop a single application as a set of loosely coupled, collaborating services. Each service implements a set of narrowly related functions and communicates with lightweight mechanisms, such as a HTTP resource API.

Microservices are relatively small and easier for a developer to understand. They provide better architecture for large applications and better isolation for scalability and damage control. However, they contain more moving parts and are harder to test.

An API gateway provides a single, unified API entry point across one or more internal APIs. It adds an additional layer of protection to your microservices by providing protection from attack vectors.

It also enables support for mixing communication protocols and decreases microservice complexity by providing authorization using API tokens, access control enforcement, and rate limiting.

In this session the followings topics will be covered:
- What are microservices
- What are the pros and cons of using microservices
- What are API gateways
- What problems API gateways are solving
- How containers fit into microservice architecture paradigm
- How to orchestrate and configure microservices and API gateways easily

One of the enduring truths about simplicity is that scale makes everything hard, and with that comes complexity. And when we’re not processing the data, how do we store it and access it?

The only way to manage large quantities of data is to make it addressable in larger pieces, above the byte level. For that, we’ve designed sets of data management protocols that help us do several things: address large lumps of data by some kind of name or handle, organize it for storage on external storage devices with different characteristics, and provide protocols that allow us to programmatically write and read it.

In this webcast, we'll compare three types of data access: file, block and object storage, and the access methods that support them. Each has its own use cases, and advantages and disadvantages; each provides simple to sophisticated data management; and each makes different demands on storage devices and programming technologies.

Perhaps you’re comfortable with block and file, but are interested in investigating the more recent class of object storage and access. Perhaps you’re happy with your understanding of objects, but would really like to understand files better, and what advantages or disadvantages they have compared to each other. Or perhaps you want to understand how file, block and object are implemented on the underlying storage systems – and how one can be made to look like the other, depending on how the storage is accessed. Join us as we discuss and debate:

Container technologies are currently one of the hottest topics in the IT world but how do they fit into traditional enterprise IT landscapes, full of legacy applications? How should governance and operational processes be aligned to better support containers? How should organizations change?
Oscar will attempt to answer these questions, and more in this webinar.

Running a single container on your laptop is super easy, running hundreds of containers in a production environment is definitely not.

Before moving to the production environment, users must find answers to dozens of questions:
- Where to store Docker images
- How to deal with sensitive data like passwords, API keys and certificates
- How to handle application states
- How load balancing should be done, etc.

One option is to use a DIY bare-bones Docker or Kubernetes setup or else use some higher-level container platform that provides solutions out-of-the-box.

In this session Lauri Nevala will talk about what is required and what aspects you need to take into an account when running containerized applications in production environments. He will also show you how to easily set up a production-grade container cluster and deploy containerized applications to the production environment with Kontena.

Presenter Lauri Nevala is a co-founder and software engineer at Kontena, Inc. He is a happy Ruby developer and DevOps guy and wants to maximize (other) developers' happiness by building Kontena - an easy to use container & microservices platform.

Team collaboration apps like Slack, Spark, Glip, and Microsoft Teams are taking the enterprise market by storm. Given the more than 20 apps now on the market, where do IT leaders begin?

In this webinar series, we'll provide insight and guidance based on Nemertes' 2018 Unified Communications and Collaboration Research Study, answering the following questions:

• What is the state of team collaboration adoption?
• What are the drivers and business cases?
• How do customers rate their vendors?
• Will team collaboration replace or augment existing UC apps?
• What are the pros and cons of a single vendor versus multi-vendor approach?
• How do I integrate team collaboration into business apps and workflows?
• How do I address security, governance, and compliance?
• How are vendors differentiating themselves?
• What are the on-premises alternatives if cloud is not an option?

Attendees will gain the information they need to make better decisions as they build and deploy their own team collaboration strategy.

Vivit launches its first ever IT Operation Management (ITOM) SIG Talk event. We have 3 speakers who will give you insights in the ITSMA Containers Concept and migration into the Hybrid Cloud. They will share their knowledge and expertise and provide thought-provoking and actionable content.

Shown below is an outline of the agenda and topics:

•Speaker: Eric Krueger
Everything you need to know about the Micro Focus ITSMA Containers Concept: Containers are here and they are the best way to deploy, maintain and upgrade software. What are containers? How are they deployed? How is the software different on containers than traditional platforms? Why did HPE/Micro Focus decide on a containerization approach to their ITSM suite? Tune in and find out why containers are the deployment method of the future and how to transition your existing ITSM suite from your Linux or Windows environment to a Containerized environment.

•Speakers: David Angradi
A “real” migration into the Hybrid Cloud (HCM, PlateSpin, and Cloud Assess): The Hybrid cloud has either been a unicorn (something beautiful but not real) or a boogey man (something to prevent disruption) in our ecosystem for the last several years. In marketing and static architectures, we have seen a lot of promises, but very little actual progress.

Hybrid Cloud is becoming more important everyday as nearly all companies are in (or will be in) the public cloud but many of these same companies ‘know’ that they cannot be 100% public. So, the problem we are all trying to solve is how can we provide all the features, functions and automations.

Everything you need to know about the Micro Focus ITSMA Containers Concept

Containers are here and they are the best way to deploy, maintain and upgrade software. What are containers? How are they deployed? How is the software different on containers than traditional platforms? Why did HPE/Micro Focus decide on a containerization approach to their ITSM suite? Tune in and find out why containers are the deployment method of the future and how to transition your existing ITSM suite from your Linux or Windows environment to a Containerized environment.

Join us for the next upcoming SIG Talk on Thursday, April 19, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1081712&group=.

A “real” migration into the Hybrid Cloud (HCM, PlateSpin, and Cloud Assess)

The Hybrid cloud has either been a unicorn (something beautiful but not real) or a boogey man (something to prevent disruption) in our ecosystem for the last several years. In marketing and static architectures, we have seen a lot of promises, but very little actual progress.

Hybrid Cloud is becoming more important everyday as nearly all companies are in (or will be in) the public cloud but many of these same companies ‘know’ that they cannot be 100% public. So, the problem we are all trying to solve is how can we provide all the features, functions and automations.
What will be covered:

Last week it was uncovered that an intern at Apple leaked some of the iPhone's source code was leaked on GitHub.

The code was for iBoot, a component of the iPhone's OS. While it was an older version of iOS 9 and Apple has declared the leak shouldn't be of concern to the average user, the community has been scratching their heads wondering how sensitive code from a conglomerate like Apple could accidentally be made public.

We hear about data leaks and security breaches almost on a weekly basis now, but when it comes to something so widely used by global consumers, it poses an even bigger concern that human error could potentially have disastrous results.

Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
•An introduction to benchmarking storage performance of workloads
•Workload characteristics
•Common Workloads (OLTP, OLAP, VMware, etc.)
•Graph fun!

This webinar will reveal the results of Nemertes Research's latest comprehensive study on everything Unified Communications and Collaboration! We will provide insights into the characteristics of a successful UCC strategy and we will also cover:

• Optimal organizational and management strategies
• Platform trends and use of the cloud
• Cost comparisons for leading vendors and deployment strategies
• How to successfully implement team collaboration
• Enterprise plans for emerging technologies including AI and virtual reality
• The evolution of the conference room
• Plans for digital whiteboards
• The emergence of digital workplaces

You will gain insight into unified communications and collaboration deployment trends and costs--real-world costs for various vendor solutions and deployment scenarios, and the impact of using third-party management tools for UC operations and administration.

The containers and microservices industry has exploded in recent years. With companies like Docker blazing the trail, we've seen a huge expansion in the application container market with other open source platforms like Red Hat, Mesosphere, Kubernetes, CoreOS... and the list goes on. However, when it comes to major mergers and acquisitions, the containers market hasn't been high on the list of deals.

It was recently publicized that Red Hat is acquiring their fellow open source vendor CoreOS for $250 million. This deal will allow them to expand their share of the Kubernetes market and enhance their Kubernetes software management.

What does this type and size deal mean for such an emerging market? What are the possibilities, potential, and even ramifications for application container, cloud application, and cloud infrastructure providers?

In the enterprise, block storage typically handles the most critical applications such as database, ERP, product development, and tier-1 virtualization. The dominant connectivity option for this has long been Fibre Channel SAN (FC-SAN), but recently many customers and block storage vendors have turned to iSCSI instead. FC-SAN is known for its reliability, lossless nature, 2x FC speed bumps, and carefully tested interoperability between vendors. iSCSI is known for running on ubiquitous Ethernet networks, 10x Ethernet speed bumps, and supporting commodity networking hardware from many vendors.

As the storage world moves to more flash and other non-volatile memory, more cloud, and more virtualization (or more containers), it’s time to revisit one of the great IT debates: Should you deploy Fibre Channel or iSCSI? Attend this SNIA Ethernet Storage Forum webcast to learn:
•Will Fibre Channel or iSCSI deliver faster performance? Does it depend on the workload?
•How is the wire speed race going between FC and iSCSI? Does anyone actually run iSCSI on 100GbE? When will 128Gb Fibre Channel arrive?
•Do Linux, Windows, or hypervisors have a preference?
•Is one really easier [to install/manage] than the other, or are they just different?
•How does the new NVMe over Fabrics protocol affect this debate?

Join SNIA experts as they compare FC vs. iSCSI and argue in an energetic yet friendly way about their differences and merits of each.

After you watch the webcast check out the Q&A blog http://sniaesfblog.org/?p=680

RIDE supports developing in notebooks, editor, RMarkdown, shiny app, Bokeh and other frameworks. Supported by R-Brain’s optimized kernels, R and Python 3 have full language support, IntelliSense, debugger and data view. Autocomplete and content assistant are available for SQL and Python 2 kernels. Spark (standalone) and Tesnsorflow images are also provided.

Using Docker in managing workspaces, this platform provides an enhanced secure and stable development environment for users with a powerful admin control for controlling resources and level of access including memory usage, CPU usage, and Idle time.

The latest stable version of IDE is always available for all users without any need of upgrading or additional DevOps work. R-Brain also delivers customized development environment for organizations who are able to set up their own Docker registry to use their customized images.

The RIDE Platform is a turnkey solution that increases efficiency in your data science projects by enabling data science teams to work collaboratively without a need to switch between tools. Explore and visualize data, share analyses, all in one IDE with root access, connection to git repositories and databases.

In a recent survey of enterprise hybrid cloud users, the Evaluator Group saw that nearly 60% of respondents indicated that lack of interoperability is a significant technology-related issue that they must overcome in order to move forward. In fact, lack of interoperability was chosen above public cloud security and network security as significant inhibitors. This webcast looks at enterprise hybrid cloud objectives and barriers with a focus on cloud interoperability within the storage domain and the SNIA’s Cloud Storage Initiative to promote interoperability and portability of data stored in the cloud.

In this last of a 3 part webinar series presented by Greenlight, Micro Focus Product Management and Greenlight group will provide an overview of the current state of IT Operations Management technologies running on enterprise grade cloud native technology stacks. Join us, and come up to speed as the experts provide a high level overview of Network Operations, Hybrid Cloud, and Datacenter Automation suites from the Micro Focus ITOM portfolio running in a Docker & Kubernetes orchestrated environment.

Vivit launches their first ever SIG Talk event with three speakers who will give you insights into StormRunner Functional, Dynamic data handling in performance tests as well as AI and machine learning as it applies to testing.

We will discuss:

•How StormRunner Functional is the latest functional test offering from Micro Focus. In this session, Chris Trimper, an early adopter and beta tester, will share his experiences with this new product

•How Virtual Table Server (VTS), in days of Mercury Interactive, was the often-overlooked repository for dynamically updated real-time test data. Even after a revamp and relaunch in 2014, many people still don't use it, but they should. Richard's VTS demo will help you to get value from this great add-on for LoadRunner and Performance Center

•How Big Data, Artificial Intelligence and Machine learning are rapidly impacting businesses and customers, enabling another massive shift through technology enablement. In this session, Todd DeCapua will share how these capabilities are being leveraged in Performance Engineering now, and into the future

Join us for the next Quality & Testing SIG Talk on Tuesday, January 9, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1041157&group=.

Public, private and hybrid cloud are nothing new, but protecting sensitive data stored on these servers is still of the utmost concern. The NSA is no exception.

It recently became publicized that the contents of a highly sensitive hard drive belonging to the NSA (National Security Agency) were compromised. The virtual disk containing the sensitive data came from an Army Intelligence project and was left on a public AWS (Amazon Web Services) storage server, not password-protected.

This is one of at least 5 other leaks of NSA-related data in recent years. Not to mention the significant number of breaches and hacks we’ve experienced lately, including Yahoo!, Equifax, WannaCry, Petya, and more.

The culprit in this case? Unprotected storage buckets. They have played a part in multiple other recent exposures, and concern is on the rise. When it comes to storing data on public cloud servers like AWS, Azure, Google Cloud, Rackspace and more, what are the key responsibilities of Storage Architects and Engineers, CIOs and CTOs to avoid these types data leaks?

Tune in with Chris Vickery, Director of Cyber Risk Research at UpGuard and the one who discovered the leak, along with George Crump, Chief Steward, Storage Switzerland, David Linthicum, Cloud Computing Visionary, Author & Speaker, Charles Goldberg, Sr. Director of Product Marketing, Thales e-Security, and Mark Carlson, Co-Chair, SNIA Technical Council & Cloud Storage Initiative, for a live panel discussion on this ever-important topics.

Cloud computing is a general concept that incorporates software-as-a-service (SaaS), platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS) and other recent well-known technology trends in which the common theme is reliance on the Internet for satisfying the computing needs of the users.

This channel features presentations by thought leaders who cover the key topic areas in this increasingly important field.